Security Officer Training Course © 2008, Gerald T. Aitken.

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

C-TPAT SECURITY AWARENESS TRAINING
Airport Security – Post 9/11
Emergency Evacuation Zayed University, Dubai Campus.
Welcome to Crime Prevention Training.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
5/3/2015 CAMPUS PUBLIC SAFETY DEPARTMENT ORIENTATION.
Chuck Barry (702)
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Theft, Disturbances, and Suspicious People.  A guest who take towels or bathrobes  An employee who takes home anything, from paper to food supplies.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Chapter 5 Enhancing Security Through Physical Controls
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Contractor Induction Program Gippsland Southern Health Service is committed to a safe and healthy work environment.
Metro Security Force Inc. “Protecting you and your property”
Tennessee Baptist Site Security Training Course 4 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
Fire Electrical Back Security
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Captain Brent Denny Public Safety  Police Department ◦ Patrol ◦ Detectives ◦ 24 sworn police officers ◦ 7 Administrative Staff ◦ Community Service.
Information Security Principles and Practices
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
1 Perimeter Security System. 2 Performance Objectives 1. List the four key duty posts of the Perimeter Security System. 2. Explain the purpose of perimeter.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
SURVEILLANCE SYSTEM HITRON DVR All rights reserved by Hitron Systems.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
1. 2  Place sharp objects away from the edge of workstation surface area  Store pencils flat  Use staple remover--not finger nails  Don’t eat or drink.
Lowe’s Certification and Accreditation.  Systems Boundaries and Functions  Vulnerabilities, Threats, and Threat Sources  Annual Loss Expectancy  Identification.
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
General Safety Training. Safety Requirements Employees must work safely and efficiently as they perform their campus duties. The employees’ responsibilities.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Chapter 6 Enhancing Security Through Procedural Controls.
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
General Safety Training. Safety Requirements Employees must work safely and efficiently as they perform their campus duties. The employees’ responsibilities.
Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
The Office Procedures and Technology Chapter 7 Time and Workstation Management Copyright 2003 by South-Western, a division of Thomson Learning.
Life and Work at the LSHTM SECURITY Tuesday 30 th September Improving health worldwidewww.lshtm.ac.uk.
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
Prepared by Jennie Yeung Summer School Safety Never leave school with anyone without a Parent Pass. May I see your Parent Pass? Although this did.
Course of Study 6. Security Management  Security and its Importance  Security of the Guest and their Property  Security Needs for the Staff and the.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
Emergency Actions Emergency Actions are composed of two actions. 1) Tornado & Severe Weather 2) Emergency Evacuation.
10. Security and Physical Protection Basic Concepts
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
The Office Procedures and Technology Chapter 7 Time and Workstation Management Copyright© 2007 Thomson/South-Western.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Draft for Discussion & Policy Purposes Only Money Room Security Assessment June 29, 2016.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Training for Employees
Administrative Practices Outcome 1
Investigative Applications 29.6
A Holistic Approach to School Security
319th SECURITY FORCES CRIME PREVENTION TIPS
Security of People, Property and Information
Objectives Telecommunications and Network Physical and Personnel
Security of Data  
Welcome Rakshak Group of Companies Rakshak Security Services & Systems Pvt. Ltd. Pilot Project for Security Training Centre.
Physical Security.
SECURITY TRAINING AND THREAT AWARENESS
Presentation transcript:

Security Officer Training Course © 2008, Gerald T. Aitken.

Part Three: Special Types of Security Theft Prevention Physical Security Alarm and Access Technology

Theft Prevention Theft is the largest percentage of asset loss Theft by employees Theft by the general public

Why People Steal Financial gain Desire to have the item in question The challenge – daredevil Retaliate against unpopular management policies Finance an addiction Psychological disorder

Opportunities for employee theft arise from: Negligent Security Officers Lax employee ethics Using an accident or arson as a diversion Using company vehicles to store items Using waste containers to store items Management creating resentful employees Failure to lock up storage areas or exterior doors

Warning Signs of Impending Theft Employee who watches officer for a long time Overly friendly employees Hole in perimeter fence Out-of-place item concealed in a strange or unusual location Adjustment of clothing Bulges in clothing Excess number of portable, desirable items in the work area

Warning Signs of Impending Theft Car strangely parked near a storage area Employee bringing in a knapsack or large bag Diversions Arms held in an unusual manner An employee walking on the far side of a group A door that is normally locked is propped open Employees loitering in storage areas

Warning Signs of Impending Theft Company vehicle parked out of place Unusual walk, stiff leg or arm A vehicle parked unusually close to an entrance or exit Book or magazine folded as if to conceal a small item Employees loitering in restricted areas

Warning Signs of Impending Theft Shifting packages from side to side Employees in a hurry Personal clothing carried in a bundle or ball Employees holding tools or materials not used for their normal duties

Preventing Theft Although catching thieves is important, PREVENTING theft is even MORE important Know what types of items can be brought onto company property (for example, a knapsack may not be allowed) Learn what marking system, if any, is used to mark equipment.

Preventing Theft Security Officers may help make Inventory Counts Learn what can be stolen – make a list of stockroom, outbuilding, sales floor, office and parking lot items Check company vehicles Use contacts with employees to gauge employee morale (when morale is low, theft increases)

Preventing Theft Perform random searches if company policy allows it Know whose signatures are authorized for Property Passes Look behind shelved merchandise Examine storage rooms and broom closets Check goods entering and exiting

Preventing Theft Check garbage containers Lock and key control Routine searches must be done at staggered times Develop informants by gaining respect of key employees

When You Suspect Theft Follow your security agency’s policy and client policy When in doubt about search policy, ask your Supervisor An error on your part could result in termination and / or court action Your attitude must be professional and non- threatening

When You Suspect Theft Bear in mind: Company managers and executives sometimes bring company laptops, etc. home. Hourly employees do not. Individuals are protected by the 4 th Amendment against unlawful searches and seizures. There must be a just and probable cause to search and seize.

When You Suspect Theft To presume intent of theft, some overt action or circumstance must be present to show wrongful intent Request the employee to step aside into the gatehouse or security office or alongside the security desk Ask the employee for identification Ask the employee to take out whatever is in the package, pocket, or bulge in clothing

When You Suspect Theft If the employee refuses, advise him or her that their refusal is a violation of company policy and could result in detention Still remain professional, polite, and non-threatening to the suspect Contact your Security Supervisor and the suspect’s supervisor Collect all allegedly stolen items

When You Suspect Theft If directed by Supervisor, detain suspect and call the police Write an Incident Report Report verbally also Report to your Security Supervisor Report to the suspect’s supervisor

After Detecting Theft If employee property is involved, the decision to prosecute under criminal law is up to the victimized employee If company property is involved, the decision to prosecute is made by client management

Physical Security First line of defense is the PERIMETER Second line of defense is the exterior of BUILDINGS Third line of defense is INTERIOR CONTROLS

Perimeter Security Outside security lighting Fencing, walls, barriers Clear demarcation of property line guarantees property owner’s rights CCTV Vehicle and truck gates Parking lots patrol Guard at booth identifying and monitoring incoming pedestrians

Exterior of Buildings CCTV Access control Locks and keys Intrusion alarms Protective lighting Glazing (adding intrusion resistant surface to windows)

Interior Controls Electronic motion detectors Card access systems Lock and key system Intrusion alarms Safes and vaults

Interior Controls Protective lighting CCTV Locked document storage cabinets Fire alarms Computer security

Controlling access People Vehicles Property

Entrance security Admit only authorized personnel with ID Discharged, suspended or laid off employees must be authorized by a department, logged in as visitors, and escorted. Record entrance and exit of all visitors and contractors. Authorize them with a department, then issue a visitor pass.

Entrance security Check materials entering facility Check all outgoing packages, ensuring there is a valid Property Pass Check Exit Pass when employee exits at an irregular hour Issue a Temporary ID to valid employees who forgot their ID card

Entrance security Employees on medical leave must obtain their doctor’s permission to visit Retirees are identified, logged in as visitors, and issued a Visitor’s Pass Do not accept a Warrant, Letter of Authority, or Subpoena Detain a Process Server at the entrance

Vehicle or Truck Gate Procedures Ensure that only authorized vehicles enter and exit Maintain vehicle record log Collect and inspect all documents required for truck entrance Lift gate arm, manually or by computer, for verified employees whose swipe card is missing or not working Inspect exiting vehicles Protect crossing pedestrians and automobiles Direct vendors, contractors, and emergency personnel

Mechanical Security Locks Single cylinder deadbolt (solid doors) Double cylinder deadbolt (doors with windows. Key must be used to enter AND leave) Vertical deadbolt (resists jimmying) Captive double cylinder deadbolt (has a special removable thumb-turn key, providing easy exit in emergencies) Cam locks (desk drawers, cabinets, lock boxes, etc.)

Key Control Maintain a Key Cabinet and Key Log at the main security desk Keys issued only to authorized employees Employees with keys may not pass the key to another employee without authorization from Key Control Employees with keys are responsible for them Lost or stolen keys are reported immediately Only Key Control may change or remove locks Unauthorized locks are removed and discarded

Alarm System Operator Aids Visual display (newer – graphical; older – text only) Sound device Logging device (saves data to disk or tape) Alarm and report printers Operator controls (keypad, keyboard, mouse or trackball)

Alarm Sensors and Detectors Glass-break sensors Stress detectors Balanced magnetic switch sensors Motion detectors (microwave, thermal, video) Light sensors Grid-wire sensors Switch sensors Infrared sensors

Alarm Sensors and Detectors Biometrics detectors Vibration sensors Capacitance sensors Laser system sensors Pressure mats Pressure switch sensors Doppler sensors Dual-technology sensor (ultrasonic or microwave, with thermal)

Anti-Fire Technology Fire alarms Flame detectors Smoke alarms Sprinkler alarms

Other Security Technology ID card readers CCTV Intercoms, telephones, radios Alarm glass Photoelectric controls

Components of Computer- Controlled Access System Electronic lock Strong door, no alternate entrances Access credential database Credential reader Decision-making processor Monitoring and recording device

Access Control Guard at entrance Frequent patrols of outdoor or open areas Fences funnel visitors “No Trespassing” signs Identification of individuals (vocal or keypad codes, coded swipe card, biometrics attribute) Locks CCTV Alarm systems

CCTV (Closed Circuit Television) Hidden surveillance Identification for entry Deterrent to crime Permanent record of events on videotape

Central Security Desk Telephone and radio Alarm console Logging software Digital audio recorder Video surveillance monitors / recorders Hot line phones Key cabinet

Alarm Response Never assume it’s a false alarm Maintain radio contact as you respond If there is evidence of an intrusion, do not enter; call the police; notify the main security desk; ask for backup.